Analysis of Lightweight Encryption Scheme for Fog-to-Things Communication.
Verified
Added on 2023/05/29
|5
|1758
|429
AI Summary
The paper discusses the implementation of IoT, its security issues, and techniques to deal with them. It proposes Elliptic Curve Public Key (ECC) as a lightweight encryption algorithm for securing wireless devices in fog-to-things communication.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Analysis of Lightweight Encryption Scheme for Fog-to-Things Communication
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Overview of the paper: Thepaperdiscussesaboutthe implementation of Iot, its various security issuesandtechniquestodealwiththe security issues. Iot is one of the emerging topic in the moderntechnologyandinnovation. although the technology is not yet properly commercialized, it has a lot of potential and it is already being implemented in various application such as smart city , transportation,health,businessand industrialization and other various filed too where technology has a key role to execute (1). Although Iot has a lot of potential in terms of application, one of the key issue of the technologyisresourceconstraint.Iot deviceshavelimitedmemoryandany security solution that is designed for the IOT devices need to take this fact into account as device resource is an important parameter for the algorithm optimization (5). As Iot devices are often small in sizes it cannot consider to have huge amount of storageascomparedtotraditional computing devices and Iot devices often comeswithlimitedstorage.Hence resource constraint is an important factor to consider in Iot environment. In Iot environment more than one device is connectedwitheachotherandhence authenticationisimportanttorecognize devicesproperlyintheIOTnetwork. Hencepropertechniqueisneededfor device authentication (5). In order to provide support for the Iot applications and manage security issues a robustarchitectureisneeded.Thefog architecturehasemergedasaleading architecture for IOT application. The fog architectureissupportedbyfog computing. Fog computing is compatible with resource constraint of IOT devices. It alsohelpstodistributetheresources properly among the IOT devices and also provides support for secure fog-to-things communication (2). Security challenges: In order to properly assess the security schemesofthefog-to-things communication it is important to review thesecuritychallengesofthefog computing. AsIotdevicesarebecomingwidely available in the market and it is being consideredforvarioussophisticated applications, a wide range of cyber-attack is being implemented on these devices. As Iotisconnectedwithinternetthe traditional security challenges still applies for the iot devices as well. However as the traditionalcorenetworkofinternetis extendedtothephysicalworld,the security challenges is also extended for the IOT applications (2). Extension of the core networkmeansthearchitecturehasto support more devices, more interactions as wellascommunicationprotocol.Hence the architecture is open to new kind cyber threats which makes it challenging to deal with the security issues (4). In the IOT architecture as many devices are connected with each other, distributed security is an important and challenging aspect of any IOT application and it becomes difficult to designmechanismtoimplement distributedsecurityforfog-to-thing communication (3). The primary reason is the resource constraint. Hence it is not possible to design sophisticated algorithm andimplementitforIotdevices. Additionallythebandwidthforthe
communicationisalsolimitedwhich creates issues such as high latency, low scalability and these issues creates security challengesforwirelesscommunication such as iot. These security challenges need to be properly reviewed before designing algorithm for Iot security. Security threats: Althoughthesecuritychallengesof traditional internet still applies for the IOT devices, still it is quite different from the traditional cybersecurity threats as it adds physicaldimensiontothetraditional internet system (3). Hence the threat of cyber security is transferred from digital world associated with data to the physical world associated with actuation. Among the major security threats of fog-to-things, impersonation, M-in-M, injection and DoS attacks are the most critical threats. Impersonationattacksreferstocyber- attacks where the cyber criminals takes chargeofthenetworkwithoutproper authorization. The cyber-criminal basically pretend to be the legitimate user and get access to the network. In the fog-to-things scenario,IotnetworksaswellasIot devices can be exploited for the identity. This kind of attacks are very much popular in the Iot environment as it has the ability toexploitthewirelesscommunication which happens to be the common platform for communication in Iot ecosystem (4). It alsoposesthreatsfortheIotbased communication that considers MAC and IPaddressforidentifyingand communicating with devices. InadditiontothisDOSidanother important security threat for fog-to-things scenario. It is a form of cyber-attack where the cyber-criminalfirst findstheissues with the device or network and with flaws in the security the hackers get access to the core of the system and once the access is established,itbecomeseasyforthe hackerstodenytheaccessofthe authenticateuserstothesystem.Itis known as denial of service or DOS. It is another popular method for exploiting iot devices and compromise the Iot security. Security requirement Hence the security requirement for the fog- to-thingsissecurethenetworkfrom impersonation and DOS. The principle of encryption which is a preferred mechanism forsecuringthetraditionalinternetis applicable for fog-to-things (3). However some modification is needed in terms of algorithm design so that it executes well with the resource constraints of Iot devices and complies with he distributed security measures of the Iot network. Proposed mechanism: Thepaperhasrecommendedfora cryptographicalgorithmcalledElliptic CurvePublicKeyorbetterknownas ECC.It is a light weight algorithm that provides encryption for securing wireless devices.Thepaperherealsodiscussed RSA algorithm and shown a comparison between the two. Although it is seen from the analysis that RSA considers longer key size than the ECC algorithm (7). However according to the authors, the principal of RSA algorithmthat the longer the key sizes better the security is not appropriate fortheIOTdevices.AlthoughRSA provides better encryption it requires better processors, storage to support executions. Hence RSA algorithm is not effective for Iot architecture (8). Hence an alternative mechanism is required and ECC according totheauthors,bestsuitedfortheIot applications.
ECC algorithm is designed on the basis of ellipticalcurvetheorywhichhelpsto create encryption key that is faster, light and effective. Although ECC creates light algorithm,ithelpstoprovidesame security level with fewer key seize. For examplethesecuritylevelwhatis provided by RSA with 1024 key seize is achieved in as low as 164 key seize and this feature makes ECC one of the most preferred mechanism for IOT application forsecuringthedeviceandtheIot network. Conclusion: The research has implemented proxy re- encryption designed with ECC encryption mechanism. This encryption is an effective mechanismforfog-to-thingsasthe algorithm is light weight and also provides similar security level compared to other encryptionalgorithmwhichrequires increased resources as well as computing power.Thealgorithmhasbeen implementedonactualfog-to-things architecturesdevelopedfor the research and some important observation has been made. The efficiency of the algorithm with respect to the run time of encryption and decryptionprocesshasbeencalculated. Thereviewoftheimplementationhas provedthatthealgorithmisnotonly effective but it is efficient too and it can be implemented across various architectures. Itisevenapplicableforproviding outsourcing of security to fog nodes which makes IoT application more secured. Some features of the algorithm like smaller key seize, faster implementation and light on resourceoutperformsthepopularRSA algorithm. However it is concluded that in order to properlyintegratethealgorithmwith smallermessageseizeitisrequiredto offload the security functionconsidered forIotapplicationstofognodesfor dealing with the resource constraints of Iot applications. However the algorithm still requiresfurthervalidationintermsof application and it should be reviewed like howthealgorithmperformsinother embeddeddeviceslikeArduinoand raspberrypiandaccordingtoauthors furtherresearchshoulddoneinthis context. References: 1.AljawarnehS,YasseinMB.A resource-efficientencryption algorithm for multimedia big data. MultimediaToolsand Applications.2017Nov 1;76(21):22703-24. 2.Lindell Y, Katz J. Introduction to moderncryptography.Chapman and Hall/CRC; 2014 Nov 6. 3.Prasetyo KN, Purwanto Y, Darlis D.Animplementationofdata encryption for Internet of Things usingblowfishalgorithmon FPGA.InInformationand CommunicationTechnology (ICoICT), 2014 2nd International
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Conference on 2014 May 28 (pp. 75-79). IEEE. 4.Raza S, Duquennoy S, Höglund J, RoedigU,VoigtT.Secure communication for the Internet of Things—acomparisonoflink‐ layersecurityandIPsecfor 6LoWPAN.Securityand CommunicationNetworks.2014 Dec;7(12):2654-68. 5.Usman M, Ahmed I, Aslam MI, KhanS,ShahUA.Sit:A lightweightencryptionalgorithm for secure internet of things. arXiv preprintarXiv:1704.08688.2017 Apr 27. 6.Wang X, Zhang J, Schooler EM, Ion M. Performance evaluation of attribute-based encryption: Toward dataprivacyintheIoT. InCommunications(ICC),2014 IEEE International Conference on 2014 Jun 10 (pp. 725-730). IEEE. 7.XinM.Amixedencryption algorithm used in internet of things securitytransmissionsystem. InCyber-EnabledDistributed ComputingandKnowledge Discovery(CyberC),2015 International Conference on 2015 Sep 17 (pp. 62-65). IEEE. 8.Zhao K, Ge L. A survey on the internetofthingssecurity. InComputationalIntelligenceand Security(CIS),20139th International Conference on 2013 Dec 14 (pp. 663-667). IEEE.